Protecting my data with security best practices
One of the most important things regarding our data is to keep it securely stored so that only authorized users or applications can access it. In this section, we will review how to control access to our data by applying access control policies and encrypting data at rest, among other good data protection practices.
Access control
Among the options we have to control who or what has access to our data within a cloud storage bucket, there is uniform access and fine-grained access.
Uniform access works in conjunction with Cloud IAM to control access to a particular bucket. It is the recommended access control method to use for data storage in general, especially if the data to be stored is of a sensitive type, such as personally identifiable information (PII), since the configuration has a lower probability of misconfiguration and thus data exposure:
Enabling uniform access...